Sciweavers

8381 search results - page 107 / 1677
» The security of machine learning
Sort
View
ML
2012
ACM
308views Machine Learning» more  ML 2012»
14 years 13 hour ago
Visualizing non-metric similarities in multiple maps
Laurens van der Maaten, Geoffrey E. Hinton
ICDCS
2012
IEEE
13 years 6 months ago
Securing Virtual Coordinates by Enforcing Physical Laws
—Virtual coordinate systems (VCS) provide accurate estimations of latency between arbitrary hosts on a network, while conducting a small amount of actual measurements and relying...
Jeffrey Seibert, Sheila Becker, Cristina Nita-Rota...
AIM
1999
15 years 4 months ago
Machine Learning, Machine Vision, and the Brain
The problem of learning is arguably at the very core of the problem of intelligence, both biological and artificial. In this paper we review our work over the last ten years in th...
Tomaso Poggio, Christian R. Shelton
SP
1998
IEEE
147views Security Privacy» more  SP 1998»
15 years 8 months ago
Secure Execution of Java Applets using a Remote Playground
Dahlia Malkhi, Michael K. Reiter, Aviel D. Rubin
ISMIR
2004
Springer
176views Music» more  ISMIR 2004»
15 years 9 months ago
The International Music Information Retrieval Systems Evaluation Laboratory: Governance, Access and Security
The IMIRSEL (International Music Information Retrieval Systems Evaluation Laboratory) project provides an unprecedented platform for evaluating Music Information Retrieval (MIR) a...
J. Stephen Downie, Joe Futrelle, David K. Tcheng